Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Efficient Multipurpose Convertible Undeniable Signature Scheme., and . KES (3), volume 3683 of Lecture Notes in Computer Science, page 325-331. Springer, (2005)Arbitrated Verifier Signature with Message Recovery for Proof of Ownership.. KES (1), volume 3681 of Lecture Notes in Computer Science, page 504-510. Springer, (2005)A Practical Method for Generating Digital Signatures Using Biometrics., , and . IEICE Trans. Commun., 90-B (6): 1381-1389 (2007)Non-interactive Cryptosystem for Entity Authentication., , and . ISW, volume 1729 of Lecture Notes in Computer Science, page 72-84. Springer, (1999)Performance Limitation of STBC OFDM-CDMA Systems in Mobile Fading Channels., , , , , , and . ICCSA (1), volume 3043 of Lecture Notes in Computer Science, page 386-393. Springer, (2004)Security in Wireless Sensor Networks: Issues and Challenges, , and . CoRR, (2007)Biometric Certificate Based Biometric Digital Key Generation with Protection Mechanism., , and . FBIT, page 709-714. IEEE Computer Society, (2007)NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack., , and . AIS, volume 3397 of Lecture Notes in Computer Science, page 90-99. Springer, (2004)Smartening the Environment using Wireless Sensor Networks in a Developing Country, , and . CoRR, (2007)New Approach on Steganalysis: Reverse-Engineering based Steganography SW Analysis., and . ICSCA, page 212-216. ACM, (2020)